Defensive Security Professional Titles
Standardized job titles, responsibilities, and expectations for defensive security professionals. Use these frameworks to understand career progression, set role expectations, and benchmark compensation.
How to use these tables: Levels are displayed as columns for easy vertical comparison. The attribute column stays fixed while you scroll horizontally.
SOC Analyst
Security Operations Center professionals who monitor, detect, and respond to security threats and incidents. Serve as the front line of defense, triaging alerts, investigating suspicious activity, and coordinating incident response efforts.
| Attribute | Analyst 1 / Entry | Analyst 2 / Junior | Analyst 3 / Mid | Analyst 4 / Senior | Analyst 5 / Staff | Analyst 6 / Senior Staff | Analyst 7 / Principal |
|---|---|---|---|---|---|---|---|
| General Description | Entry-level SOC analyst learning security monitoring fundamentals and alert triage processes. Follows established playbooks to investigate and escalate security events. Develops foundational knowledge of security tools, attack patterns, and incident response procedures. | Junior SOC analyst capable of conducting independent alert investigations and participating in incident response activities. Demonstrates proficiency with security monitoring tools and can identify true positive security events. Beginning to develop specialization in specific threat types or tools. | Experienced SOC analyst who leads incident investigations and drives detection improvements. Demonstrates expertise in threat analysis, incident response, and security tool optimization. Serves as subject matter expert for specific threat types or platforms and mentors junior analysts. | Senior SOC analyst who serves as the escalation point for the most complex investigations and critical incidents. Deep technical expertise across detection, response, and threat hunting. Mentors junior and mid-level analysts. Drives detection improvements and process refinements within the SOC team. | Staff SOC analyst whose work products and technical decisions extend beyond the SOC team. Builds the systems, pipelines, and methodologies that other analysts use. Owns cross-team technical problems — log ingestion architecture, detection-as-code frameworks, data quality standards — that no single team can solve alone. Recognized as a technical authority within the organization. | Senior Staff SOC analyst who shapes how the security monitoring function operates across the entire organization. Defines the detection coverage model mapped to business risk, architects multi-year SOC platform evolution, and sets the measurement framework reported to executive leadership. Technical decisions at this level directly affect company-level security posture and strategy. | Principal SOC analyst at the apex of the detection and monitoring discipline. Creates detection methodologies, data models, or frameworks adopted industry-wide. Work changes how SOCs everywhere approach classes of threats. Publishes research that shapes vendor roadmaps and industry standards. Extremely rare — one or two per large enterprise. |
| Primary Responsibilities |
|
|
|
|
|
|
|
| Required Skills |
|
|
|
|
|
|
|
| Preferred Skills |
|
|
|
|
|
|
|
| Mentorship Requirements | Receives direct mentorship from Senior SOC analysts. Participates in shift handoffs and team briefings. Expected to complete SOC onboarding and tool training within first 3 months. Shadows senior analysts on incident investigations. | Receives guidance from Senior analysts on complex investigations. Expected to begin mentoring Entry-level analysts informally. Participates in knowledge sharing and team training sessions. Should be developing expertise in 1-2 specific areas. | Primary mentor for Junior and Entry analysts. Leads training sessions on specialty areas. Expected to develop and maintain SOC training materials. Establishes reputation as go-to expert in specific domains. | Primary mentor for Mid and Junior analysts. Leads training sessions on specialty areas. Reviews complex investigations and provides technical guidance. Expected to identify and develop high-potential analysts. | Mentors Senior analysts on technical depth and cross-team influence. Guides analysts developing detection engineering specializations. Creates technical standards and patterns that implicitly mentor through documentation. Beginning to build external reputation. | Mentors Staff analysts toward broader organizational influence. Shapes SOC career paths and technical development standards organization-wide. Industry mentorship through published work and community engagement. | Develops the next generation of SOC technical leaders. Industry-level mentorship through published work, open-source contributions, and community engagement. Legacy-building through lasting contributions to the detection discipline. |
| Impact Scope | Individual contributor on alert triage and initial investigation. Impact limited to assigned alerts and tickets. Work is reviewed before escalation or closure. Contributes to overall SOC coverage and response time metrics. | Directly contributes to incident detection and response. Responsible for accurate alert triage and investigation. Detection improvements impact organizational security posture. Beginning to influence SOC processes. | Shapes SOC detection capabilities and processes. Leads major incident responses impacting organization. Detection improvements measurably reduce risk. Influences tool selection and investment decisions. | Shapes SOC detection capabilities and team processes. Critical incident outcomes depend on technical leadership. Detection improvements measurably reduce organizational risk. Influences SOC tool selection and process decisions. | Cross-team impact — technical decisions affect how multiple teams produce and consume security telemetry. Detection infrastructure serves the entire security organization. Methodology and pipeline improvements scale analyst effectiveness across the SOC. | Organization-wide — shapes how the entire company approaches detection and monitoring. Platform decisions carry multi-year, multi-million-dollar consequences. Detection coverage model directly influences organizational risk posture. | Industry-wide impact. Defines how security monitoring is practiced beyond the organization. Creates lasting contributions to detection methodology. Work influences vendor products and industry standards. |
| Autonomy & Decision Authority | Works under close supervision following playbooks. Follows established escalation procedures. Limited authority to close alerts independently. Escalates all potential incidents to senior team members. | Works with moderate supervision. Can make triage decisions on standard alerts. Authority to close false positives independently. Escalates complex or high-severity incidents. | Works independently with strategic guidance. Makes significant investigation and response decisions. Authority over detection rule development. Consulted on SOC process and tooling decisions. | High autonomy on technical decisions. Makes significant investigation and response decisions independently. Authority over detection rule strategy and playbook standards. Consulted on SOC process and tooling decisions. | Near-complete autonomy on technical decisions within detection and monitoring domain. Makes SOC platform and architecture decisions. Consulted on security-wide data and tooling strategy. Trusted to represent SOC technical interests in cross-org forums. | Full autonomy over SOC technical strategy. Makes platform and architecture decisions with significant budget implications. Accountable to CISO for detection capability outcomes. Trusted advisor to security leadership on monitoring strategy. | Complete autonomy over technical domain. Shapes organizational security strategy. May have significant influence over industry direction. Executive-level decision authority on detection and monitoring matters. |
| Communication & Stakeholders | Primarily internal communication with SOC team and shift lead. Documents findings in ticketing system. May participate in shift handoffs. Limited interaction outside immediate team. | Regular interaction with SOC team and incident responders. May communicate with IT teams during incidents. Participates in incident bridges. Documents findings for broader team consumption. | Regular communication with security leadership. Presents findings to technical and management audiences. Primary analyst contact for major incidents. Coordinates with IT, legal, and business stakeholders during incidents. | Regular communication with security leadership during incidents. Presents findings to technical and management audiences. Coordinates with IT, legal, and business stakeholders during major incidents. Primary technical contact for cross-team security issues. | Regular engagement with security leadership on SOC strategy. Negotiates technical requirements with engineering and IT leadership. Presents data architecture and detection strategy to cross-functional stakeholders. Beginning to represent organization externally. | Regular CISO-level engagement on detection strategy and coverage. Presents SOC platform strategy to executive leadership. Represents organization's monitoring capabilities to external assessors. Industry conference presentations and published research. | Industry-wide presence through publications and speaking. Board-level engagement on detection posture. Standards body and industry forum leadership. Media and analyst engagement. |
| Degree / Experience | Bachelor's degree in Computer Science, Cybersecurity, IT, or related field, OR 1-2 years of IT support or helpdesk experience, OR completion of SOC analyst training program with demonstrated practical skills. | Bachelor's degree in Computer Science, Cybersecurity, or related field, OR 2-3 years of SOC or security monitoring experience. Demonstrated investigation skills and tool proficiency. | Bachelor's degree in Computer Science, Cybersecurity, or related field, OR 4-6 years of SOC or incident response experience. Demonstrated leadership in major incident investigations. May have Master's degree with less experience. | Bachelor's or Master's degree in relevant field, OR 6-10 years of SOC or incident response experience. Demonstrated leadership in major incident investigations. | Bachelor's or Master's degree in relevant field, OR 8-12 years of SOC, detection engineering, or security operations experience. Demonstrated cross-team technical influence and force-multiplying impact. | Bachelor's or Master's degree in relevant field, OR 10-15 years of SOC, detection engineering, or security operations experience. Demonstrated organization-wide technical authority and impact. | Advanced degree often present but industry recognition is the primary qualification. 12-15+ years of elite SOC, detection engineering, or threat hunting experience with demonstrated industry impact. |
| Certifications |
|
|
|
|
|
|
|
| Salary: US Gov't | $50,000 - $70,000 (GS-7 to GS-9) | $65,000 - $85,000 (GS-9 to GS-11) | $85,000 - $115,000 (GS-12 to GS-13) | $110,000 - $145,000 (GS-14 to GS-15) | $130,000 - $157,000 (GS-14) | $147,000 - $176,000 (GS-15) | $155,000 - $191,000 (GS-15 step 5-10) |
| Salary: US Startup | $55,000 - $75,000 | $70,000 - $95,000 | $95,000 - $130,000 | $130,000 - $170,000 + equity | $155,000 - $190,000 + equity | $175,000 - $215,000 + equity | $200,000 - $250,000 + significant equity |
| Salary: US Corporate | $50,000 - $70,000 | $65,000 - $90,000 | $90,000 - $120,000 | $120,000 - $160,000 | $150,000 - $185,000 | $170,000 - $210,000 | $195,000 - $245,000 |
| Salary: Big Tech (Mag7) | $110,000 - $170,000 | $150,000 - $240,000 | $220,000 - $350,000 | $300,000 - $480,000 | $330,000 - $500,000 | $420,000 - $580,000 | $500,000 - $680,000 |
Incident Responder
Professionals who lead the investigation, containment, eradication, and recovery phases of security incidents. Distinct from SOC analysts (who focus on monitoring and detection) and forensic analysts (who focus on deep evidence examination), incident responders own the end-to-end response lifecycle — coordinating across technical, legal, and business stakeholders to minimize damage and restore operations. Often serve on-call rotations and must perform under sustained pressure during active breaches.
| Attribute | Responder 1 / Entry | Responder 2 / Mid | Responder 3 / Senior | Responder 4 / Staff | Responder 5 / Senior Staff | Responder 6 / Principal |
|---|---|---|---|---|---|---|
| General Description | Entry-level incident responder learning the incident response lifecycle and evidence handling fundamentals. Executes established playbooks under direct supervision during incidents. Assists with evidence collection, triage, and documentation. Develops foundational knowledge of forensic artifacts, containment techniques, and incident case management. | Mid-level incident responder capable of running incidents semi-independently through containment, eradication, and recovery. Develops and refines IR playbooks. Performs malware triage and IOC extraction. Coordinates containment actions with IT operations and begins participating in on-call rotation. | Senior incident responder who leads complex, high-severity incidents end-to-end including active-adversary engagements such as ransomware and nation-state intrusions. Serves as the escalation point for difficult incidents. Coordinates with legal and executive stakeholders during active breaches. Mentors mid-level and entry responders on technical execution and incident leadership judgment. | Staff incident responder whose impact extends beyond individual incident response into building the systems, frameworks, and cross-organizational readiness that multiply the entire IR team's effectiveness. Builds the IR automation and orchestration framework, designs cross-org incident readiness programs, and creates novel response methodologies adopted beyond the IR team. Technical decisions affect how the broader organization prepares for and responds to incidents. | Senior Staff incident responder who shapes how the incident response function operates across the entire organization. Designs the company's IR operating model — how IR intersects legal, communications, engineering, and executive decision-making during a crisis. Builds the technical architecture for response at company scale. Defines incident severity frameworks and SLAs that become company policy. Technical decisions directly affect company-level security posture, regulatory standing, and cyber insurance positioning. | Principal incident responder at the apex of the IR discipline. Creates incident response frameworks, methodologies, or forensic techniques adopted industry-wide. Work changes how organizations everywhere approach incident response. Authors the standards and methodologies taught in training programs. Develops novel forensic techniques for emerging platforms that become standard practice. Extremely rare — one or two per large enterprise. |
| Primary Responsibilities |
|
|
|
|
|
|
| Required Skills |
|
|
|
|
|
|
| Preferred Skills |
|
|
|
|
|
|
| Mentorship Requirements | Receives direct mentorship from mid and senior incident responders on every case. Shadows experienced responders during active incidents before handling tasks independently. Expected to complete IR tool training and evidence handling certification within first 6 months. | Mentors entry-level responders on evidence handling and playbook execution. Receives mentorship from senior responders focused on strategic decision-making and stakeholder management during complex incidents. Should be developing expertise in a specialization (cloud IR, ransomware, insider threat). | Mentors mid-level and entry-level responders on both technical execution and incident leadership judgment. Responsible for developing team members' ability to independently lead incidents. Establishes standards for evidence handling and case documentation quality. | Mentors Senior responders on cross-team influence and capability building. Guides responders developing IR specializations. Creates technical standards and methodologies that implicitly mentor through documentation. Building external reputation in the IR community. | Mentors Staff responders toward broader organizational influence. Shapes IR career paths and development standards organization-wide. Industry mentorship through published work and community engagement. | Develops the next generation of IR leaders. Industry-level mentorship through published work, open-source contributions, and community engagement. Legacy-building through lasting contributions to the IR discipline. |
| Impact Scope | Individual contributor executing assigned response tasks. Impact limited to specific evidence collection and documentation steps. All containment decisions reviewed by senior team members before execution. | Directly shapes containment strategy on individual incidents. Detection content from incidents improves organizational security posture. Playbook improvements benefit the entire IR team. Response decisions affect business operations during active incidents. | Post-incident recommendations influence security architecture and policy. Containment decisions during major incidents have direct business consequences. IR process improvements shape how the team responds to threats. | Cross-team impact — IR automation and readiness programs serve the entire security organization and beyond. Response methodology improvements scale effectiveness across all responders. On-call program design affects responder well-being and retention. | Organization-wide — shapes how the entire company responds to incidents. IR operating model decisions carry multi-year consequences. Severity frameworks and policies become organizational standards. Board confidence in incident readiness depends on this role's work. | Industry-wide impact. Defines how incident response is practiced beyond the organization. Creates lasting contributions to IR methodology and forensic technique. Work influences vendor products, training curricula, and industry standards. |
| Autonomy & Decision Authority | Works under close supervision. Executes defined playbook actions only. No authority to make containment decisions independently. Escalates all findings and severity assessments to senior responders. | Works with moderate supervision. Makes containment decisions on routine incidents independently. Escalates novel, high-severity, or business-impacting incidents to senior responders. Authority to coordinate IT actions within approved containment scope. | High autonomy — makes real-time containment decisions with business consequences (shutting down production systems, initiating legal hold). Trusted to represent the organization to law enforcement during incidents. Consulted on IR tooling and process decisions. | Near-complete autonomy on IR technical decisions and tooling strategy. Makes IR platform and automation architecture decisions. Consulted on security-wide incident readiness strategy. Trusted to represent IR interests in cross-org forums. | Full autonomy over IR program strategy and architecture. Makes decisions with significant budget and organizational implications. Accountable to CISO for IR readiness and program outcomes. Authorizes breach notifications and major containment actions. | Complete autonomy over technical domain. Shapes organizational security strategy. May have significant influence over industry direction. Executive-level decision authority on incident response matters. |
| Communication & Stakeholders | Primarily internal communication with IR team. Documents findings in case management system. May participate in incident bridge calls as a listener. Limited interaction outside the IR team. | Regular interaction with IT operations and department heads of affected business units during incidents. Participates actively in incident bridge calls. Communicates technical status to non-technical stakeholders. Coordinates with SOC analysts on detection and handoff. | Communicates directly with CISO and general counsel during active incidents. Primary interface with external IR retainer firms and law enforcement. Presents post-incident findings and recommendations to senior management. | Regular engagement with security leadership on IR capability and readiness. Coordinates with legal, communications, and business unit leadership on incident preparedness. Presents IR metrics and program status to executive stakeholders. Beginning to represent organization externally. | Board-level and executive committee communication on IR program effectiveness. Primary organizational contact for regulators, law enforcement, and cyber insurance carriers. Represents the organization at industry forums. Manages strategic relationships with external IR firms and legal counsel. | Industry-wide presence through publications and speaking. Board-level engagement on IR posture. Standards body and industry forum leadership. Media and analyst engagement during high-profile breaches. |
| Degree / Experience | Bachelor's degree in Computer Science, Cybersecurity, IT, or related field, OR 1-2 years of SOC, helpdesk, or IT operations experience, OR completion of an incident response training program with demonstrated practical skills. | Bachelor's degree in Computer Science, Cybersecurity, or related field, OR 3-5 years of IR, SOC, or DFIR experience. Demonstrated ability to lead incidents through resolution. | Bachelor's degree plus 5-8 years of IR or DFIR experience, OR equivalent hands-on experience. Track record of leading major incidents is the primary credential. Master's degree occasionally preferred but rarely required. | Bachelor's degree plus 8-12 years of IR or DFIR experience. Demonstrated cross-team technical influence and force-multiplying impact. Portfolio of incidents led and capabilities built. | Bachelor's degree plus 10-15 years of experience with significant time leading major incidents and designing IR programs. MBA or master's in cybersecurity occasionally relevant but not expected. Portfolio of incidents led and programs built is the primary credential. | Advanced degree often present but industry recognition is the primary qualification. 12-15+ years of elite IR or DFIR experience with demonstrated industry impact. |
| Certifications |
|
|
|
|
|
|
| Salary: US Gov't | $60,000 - $90,000 (GS-9 to GS-11) | $90,000 - $120,000 (GS-12 to GS-13) | $115,000 - $155,000 (GS-13 to GS-14) | $130,000 - $157,000 (GS-14) | $147,000 - $176,000 (GS-15) | $155,000 - $191,000 (GS-15 step 5-10) |
| Salary: US Startup | $75,000 - $100,000 | $105,000 - $145,000 | $145,000 - $185,000 | $170,000 - $210,000 + equity | $195,000 - $235,000 + equity | $220,000 - $270,000 + significant equity |
| Salary: US Corporate | $70,000 - $95,000 | $100,000 - $135,000 | $135,000 - $175,000 | $160,000 - $200,000 | $185,000 - $225,000 | $210,000 - $260,000 |
| Salary: Big Tech (Mag7) | $140,000 - $210,000 | $230,000 - $370,000 | $320,000 - $500,000 | $350,000 - $530,000 | $450,000 - $600,000 | $520,000 - $720,000 |
Security Administrator
Professionals who implement, configure, and maintain security controls and infrastructure. Responsible for the day-to-day operation of security tools, policy enforcement, and ensuring security systems function effectively to protect organizational assets.
| Attribute | Admin 1 / Entry | Admin 2 / Junior | Admin 3 / Mid | Admin 4 / Senior | Admin 5 / Staff | Admin 6 / Senior Staff | Admin 7 / Principal |
|---|---|---|---|---|---|---|---|
| General Description | Entry-level security administrator learning to operate and maintain security tools and controls. Performs routine administrative tasks following established procedures. Develops foundational knowledge of security technologies, access management, and policy implementation. | Junior security administrator capable of independently managing security tools and implementing security controls. Demonstrates proficiency in security system administration and can troubleshoot common issues. Beginning to develop expertise in specific security technologies or domains. | Experienced security administrator who independently manages complex security infrastructure and leads implementation projects. Serves as subject matter expert for specific security technologies and mentors junior team members. Contributes to security architecture decisions and process improvements. | Senior security administrator and technical leader who serves as the escalation point for critical security system issues. Deep expertise across enterprise security infrastructure. Leads complex implementations and mentors the security administration team. Drives process improvements and technology evaluations within the security operations function. | Staff security administrator whose impact extends beyond the security admin team into designing the security operations platform strategy and building the automation frameworks that other administrators use daily. Owns cross-team problems — how EDR, vulnerability management, identity, and network security tools integrate into a coherent stack. Builds self-service security infrastructure so other teams can consume security services without filing tickets. | Senior Staff security administrator who owns the enterprise security operations architecture — the unified strategy for how identity, network, endpoint, and cloud security controls compose into a defensible whole. Drives build-vs-buy decisions on security platforms with multi-million-dollar implications. Designs the zero-trust implementation roadmap that reshapes how every team accesses infrastructure. Technical decisions at this level directly affect company-level security posture and operational cost structure. | Principal security administrator at the apex of the security operations infrastructure discipline. Defines architectural patterns adopted as industry standards — the reference architectures that vendors and enterprises implement. Shapes how security infrastructure categories evolve and contributes to industry standards that define best practices. Extremely rare — one or two per large enterprise. |
| Primary Responsibilities |
|
|
|
|
|
|
|
| Required Skills |
|
|
|
|
|
|
|
| Preferred Skills |
|
|
|
|
|
|
|
| Mentorship Requirements | Receives direct mentorship from Senior security administrators. Shadows on complex tasks and projects. Expected to complete tool-specific training within first 6 months. Participates in team knowledge sharing sessions. | Receives guidance from Senior administrators on complex tasks. Expected to begin mentoring Entry-level team members. Contributes to documentation and procedure development. Should be developing expertise in specific tool sets. | Primary mentor for Junior and Entry administrators. Leads training on specialty tools and technologies. Expected to develop standards and best practices documentation. Establishes reputation as go-to expert in specific domains. | Primary mentor for Mid and Junior administrators. Leads training on complex infrastructure and tool administration. Reviews significant configuration changes and provides technical guidance. Expected to identify and develop high-potential team members. | Mentors Senior administrators on cross-team influence and platform thinking. Guides administrators developing automation and engineering specializations. Creates technical standards and frameworks that implicitly mentor through documentation. Building external reputation. | Mentors Staff administrators toward broader organizational influence. Shapes security administration career paths and development standards organization-wide. Industry mentorship through published work and community engagement. | Develops the next generation of security infrastructure leaders. Industry-level mentorship through published work, open-source contributions, and community engagement. Legacy-building through lasting contributions to the discipline. |
| Impact Scope | Individual contributor on assigned administrative tasks. Impact limited to routine operations and ticket resolution. Work is reviewed before implementation. Supports overall security operations effectiveness. | Directly maintains security controls protecting organization. Responsible for tool availability and effectiveness. Configuration changes impact security posture. Beginning to influence security infrastructure decisions. | Shapes security infrastructure capabilities. Project outcomes directly impact security posture. Standards and automation improve team effectiveness. Influences technology selection and investment. | Shapes security infrastructure capabilities for the organization. Complex implementation decisions impact long-term security posture. Standards and automation improvements benefit the entire security operations team. | Cross-team impact — platform strategy and automation frameworks serve the entire security organization. Self-service infrastructure changes how other teams interact with security. Integration decisions affect tool effectiveness across multiple teams. | Organization-wide — shapes how the entire company operates security infrastructure. Platform decisions carry multi-year, multi-million-dollar consequences. Infrastructure architecture directly influences organizational security posture and operational costs. | Industry-wide impact. Defines how security operations infrastructure is designed and operated beyond the organization. Creates lasting contributions to security architecture methodology. |
| Autonomy & Decision Authority | Works under close supervision. Follows established procedures for all tasks. Limited authority to make configuration changes independently. Escalates non-routine requests to senior team members. | Works with moderate supervision. Can make routine configuration decisions. Authority to implement approved changes independently. Escalates significant changes or non-standard requests. | Works independently with strategic guidance. Makes significant configuration and design decisions. Authority over tool optimization and automation. Consulted on infrastructure and architecture decisions. | High autonomy on technical decisions. Makes significant infrastructure and configuration decisions independently. Authority over security administration standards and procedures. Consulted on tooling investment and architecture decisions. | Near-complete autonomy on security infrastructure and platform decisions. Makes tooling architecture and integration decisions. Consulted on security-wide infrastructure strategy. Trusted to represent security infrastructure interests in cross-org forums. | Full autonomy over security infrastructure strategy. Makes platform and architecture decisions with significant budget implications. Accountable to CISO for infrastructure capability outcomes. Trusted advisor to security leadership on operations strategy. | Complete autonomy over technical domain. Shapes organizational security strategy. May have significant influence over industry direction and vendor roadmaps. Executive-level decision authority. |
| Communication & Stakeholders | Primarily internal communication with security team and IT. Responds to tickets from end users. Documents work in ticketing systems. Limited stakeholder interaction outside immediate team. | Regular interaction with IT teams and security stakeholders. Communicates with vendors on support issues. Participates in project meetings. Documents work for team consumption. | Regular communication with security leadership and IT. Presents technical recommendations to stakeholders. Coordinates with vendors on complex issues. Documents standards for broader organization. | Regular communication with security leadership on infrastructure strategy. Presents technical recommendations to stakeholders and governance boards. Coordinates with vendors on complex issues and contract discussions. Primary technical contact for cross-team security infrastructure needs. | Regular engagement with security leadership on platform strategy. Negotiates technical requirements with IT and engineering leadership. Presents infrastructure and automation strategy to cross-functional stakeholders. | Regular CISO-level engagement on infrastructure strategy. Presents technology roadmap and investment plans to executive leadership. Represents organization's infrastructure capabilities to external assessors. Industry presence through publications and speaking. | Industry-wide presence through publications and speaking. Board-level engagement on infrastructure posture. Standards body and industry forum leadership. |
| Degree / Experience | Bachelor's degree in IT, Computer Science, Cybersecurity, or related field, OR 1-2 years of IT administration experience, OR completion of relevant technical certification program. | Bachelor's degree in IT, Cybersecurity, or related field, OR 2-4 years of security or IT administration experience. Demonstrated proficiency with security tool administration. | Bachelor's degree in IT, Cybersecurity, or related field, OR 4-6 years of security administration experience. Demonstrated expertise with complex security infrastructure. May have Master's degree with less experience. | Bachelor's or Master's degree in relevant field, OR 6-10 years of security administration experience. Demonstrated technical leadership and impact on security infrastructure. | Bachelor's or Master's degree in relevant field, OR 8-12 years of security administration or infrastructure engineering experience. Demonstrated cross-team technical influence and force-multiplying impact. | Bachelor's or Master's degree in relevant field, OR 10-15 years of security administration or infrastructure engineering experience. Demonstrated organization-wide technical authority and strategic impact. | Advanced degree often present but industry recognition is the primary qualification. 12-15+ years of elite security infrastructure experience with demonstrated industry impact. |
| Certifications |
|
|
|
|
|
|
|
| Salary: US Gov't | $50,000 - $70,000 (GS-7 to GS-9) | $65,000 - $90,000 (GS-9 to GS-11) | $90,000 - $120,000 (GS-12 to GS-13) | $115,000 - $150,000 (GS-14 to GS-15) | $127,000 - $155,000 (GS-14) | $145,000 - $174,000 (GS-15) | $155,000 - $191,000 (GS-15 step 5-10) |
| Salary: US Startup | $55,000 - $80,000 | $75,000 - $100,000 | $100,000 - $140,000 | $140,000 - $180,000 + equity | $155,000 - $190,000 + equity | $175,000 - $215,000 + equity | $195,000 - $245,000 + significant equity |
| Salary: US Corporate | $50,000 - $75,000 | $70,000 - $95,000 | $95,000 - $130,000 | $130,000 - $170,000 | $150,000 - $185,000 | $170,000 - $205,000 | $190,000 - $240,000 |
| Salary: Big Tech (Mag7) | $110,000 - $170,000 | $150,000 - $240,000 | $220,000 - $350,000 | $300,000 - $480,000 | $330,000 - $490,000 | $410,000 - $560,000 | $480,000 - $660,000 |
Security Engineer
Technical professionals who design, build, and implement security solutions and controls. Focus on developing security capabilities through engineering, automation, and integration. Bridge the gap between security requirements and technical implementation.
| Attribute | Engineer 1 / Entry | Engineer 2 / Junior | Engineer 3 / Mid | Engineer 4 / Senior / Lead | Engineer 5 / Staff | Engineer 6 / Senior Staff | Engineer 7 / Principal |
|---|---|---|---|---|---|---|---|
| General Description | Entry-level security engineer learning to develop and implement security solutions. Assists with security tool deployments, automation development, and security control implementation. Focuses on building technical skills in security engineering and software development practices. | Junior security engineer capable of independently developing security solutions and automation. Demonstrates proficiency in security engineering practices and can implement security controls in production environments. Beginning to develop expertise in specific security domains or technologies. | Experienced security engineer who independently designs and implements complex security solutions. Leads engineering projects and serves as technical expert for specific security domains. Mentors junior engineers and contributes to security architecture decisions. | Senior security engineer and technical leader who sets technical direction for security engineering initiatives. Leads complex, high-impact projects and serves as the escalation point for difficult engineering challenges. Drives innovation in security capabilities and represents engineering to the broader organization. | Distinguished security engineer who operates at the highest levels of technical excellence. Defines organizational security engineering strategy and drives innovation across the practice. Recognized externally as an industry expert and thought leader in security engineering. | Senior Staff security engineer who shapes how the security engineering function operates across the entire organization. Defines the engineering platform strategy, drives multi-year technology evolution, and makes build-vs-buy decisions with significant budget implications. Technical decisions at this level directly affect company-level security posture and engineering cost structure. | Legendary security engineer at the pinnacle of technical expertise. Sets industry direction and is recognized globally as a defining voice in security engineering. Combines unparalleled technical depth with strategic vision and business impact. |
| Primary Responsibilities |
|
|
|
|
|
|
|
| Required Skills |
|
|
|
|
|
|
|
| Preferred Skills |
|
|
|
|
|
|
|
| Mentorship Requirements | Receives direct mentorship from Senior security engineers. Participates in code reviews and pair programming. Expected to complete engineering onboarding and training. Shadows on security projects and implementations. | Receives guidance from Senior engineers on complex projects. Expected to begin mentoring Entry-level engineers informally. Contributes to engineering standards and documentation. Should be developing expertise in specific areas. | Primary mentor for Junior and Entry engineers. Leads technical training and knowledge sharing. Expected to develop engineering standards and patterns. Establishes reputation as expert in specific domains. | Primary mentor for multiple engineers. Responsible for team career development. Creates engineering development programs. Industry mentorship through community engagement. Shapes engineering culture and practices. | Mentors Senior and Lead engineers. Shapes career paths across organization. Develops mentorship programs. Industry-level mentorship through community engagement. Sponsors high-potential individuals. | Mentors Staff engineers toward broader organizational influence. Shapes security engineering career paths and development standards organization-wide. Industry mentorship through published work and community engagement. | Develops organizational leadership pipeline. Mentors future industry leaders. Legacy-building through talent development. May sponsor research and education initiatives. |
| Impact Scope | Individual contributor on assigned engineering tasks. Impact limited to specific components or scripts. Work is reviewed before deployment. Contributes to team automation and tooling improvements. | Directly builds security capabilities protecting organization. Responsible for quality and reliability of developed solutions. Engineering decisions impact security effectiveness. Beginning to influence technical direction. | Shapes security engineering capabilities. Project outcomes directly impact security posture. Engineering decisions set patterns for team. Influences technology selection and architecture. | Defines security engineering capabilities for organization. Strategic decisions impact long-term security posture. Team development impacts organizational maturity. Innovation shapes competitive advantage. | Organizational and industry-level impact. Shapes company technical reputation. Defines engineering capabilities and standards. Influences industry practices through thought leadership. | Organization-wide — shapes how the entire company approaches security engineering. Platform decisions carry multi-year, multi-million-dollar consequences. Engineering standards directly influence organizational security posture. | Global industry impact. Defines how security engineering is practiced. Organizational transformation. Creates lasting contributions to the field. |
| Autonomy & Decision Authority | Works under close supervision. Follows established coding standards and practices. Limited authority to make design decisions independently. Escalates technical questions to senior engineers. | Works with moderate supervision. Can make implementation decisions within defined scope. Authority to merge code following review process. Escalates significant design decisions. | Works independently with strategic guidance. Makes significant design and implementation decisions. Authority over technical approach within projects. Consulted on architecture and technology decisions. | High autonomy with strategic alignment. Makes significant technical and investment decisions. Authority over engineering standards and practices. Trusted to represent organization externally. | Near-complete technical autonomy. Strategic decision-making authority. Influences organizational direction. Authority over technical standards. Trusted advisor to executive leadership. | Full autonomy over security engineering strategy. Makes platform and architecture decisions with significant budget implications. Accountable to CISO for engineering capability outcomes. Trusted advisor to executive leadership. | Complete autonomy over technical domain. Executive-level decision authority. Shapes organizational strategy. May have significant investment authority. |
| Communication & Stakeholders | Primarily internal communication with engineering team. Documents work in code repositories and wikis. Participates in team standups and planning. Limited stakeholder interaction outside immediate team. | Regular interaction with security and engineering teams. Participates in architecture discussions. Documents designs for team review. May present technical solutions to stakeholders. | Regular communication with security leadership and architecture. Presents technical designs to stakeholders. Coordinates with vendors on integrations. Documents patterns for broader organization. | Executive-level communication on engineering strategy. Represents team to organizational leadership. Industry conference presentations. Builds relationships with industry peers and vendors. | C-suite and board-level engagement. Industry-wide communication through publications. Builds relationships with industry peers. Media and analyst engagement. | Regular CISO-level engagement on engineering strategy. Presents platform strategy and investment plans to executive leadership. Represents organization's engineering capabilities to external stakeholders. Industry conference presentations. | Global industry presence. Media and public thought leadership. Government engagement. Premier industry venues. |
| Degree / Experience | Bachelor's degree in Computer Science, Software Engineering, Cybersecurity, or related field, OR 1-2 years of software development or IT experience, OR completion of coding bootcamp with security focus. | Bachelor's degree in Computer Science, Software Engineering, or related field, OR 2-4 years of security engineering or software development experience. Demonstrated ability to build security solutions. | Bachelor's degree in Computer Science, Software Engineering, or related field, OR 4-6 years of security engineering experience. Demonstrated track record of successful complex implementations. May have Master's degree with less experience. | Bachelor's or Master's degree in relevant field, OR 6-10 years of security engineering experience. Demonstrated team leadership and strategic impact. Industry recognition through tools, research, or speaking. | Bachelor's or Master's degree in relevant field, OR 10+ years of security engineering experience with demonstrated industry impact. Advanced degree may be expected. Industry recognition is essential. | Bachelor's or Master's degree in relevant field, OR 10-15 years of security engineering experience. Demonstrated organization-wide technical authority and impact. Advanced degree may be expected. | Advanced degree often present, but industry recognition is primary qualification. 15+ years of elite experience with transformational impact. May be founders or pioneers of major tools or techniques. |
| Certifications |
|
|
|
|
|
|
|
| Salary: US Gov't | $65,000 - $85,000 (GS-9 to GS-11) | $80,000 - $110,000 (GS-11 to GS-12) | $100,000 - $135,000 (GS-12 to GS-13) | $125,000 - $160,000 (GS-14 to GS-15) | $150,000 - $190,000 (GS-15 / SES equivalent) | $147,000 - $183,000 (GS-15) | $180,000 - $230,000+ (Senior SES equivalent) |
| Salary: US Startup | $75,000 - $100,000 | $95,000 - $130,000 | $130,000 - $170,000 | $160,000 - $210,000 + equity | $200,000 - $270,000 + significant equity | $185,000 - $235,000 + significant equity | $260,000 - $380,000+ + major equity |
| Salary: US Corporate | $70,000 - $95,000 | $90,000 - $120,000 | $120,000 - $155,000 | $150,000 - $195,000 | $185,000 - $240,000 | $180,000 - $225,000 | $240,000 - $320,000+ |
| Salary: Big Tech (Mag7) | $120,000 - $190,000 | $170,000 - $280,000 | $250,000 - $400,000 | $350,000 - $550,000 | $500,000 - $800,000 | $430,000 - $620,000 | $700,000 - $1,200,000 |
Security Architect
Strategic technical leaders who design security frameworks, architectures, and strategies for organizations. Focus on translating business requirements into security designs, evaluating technologies, and ensuring security is integrated into enterprise architecture.
| Attribute | Architect 1 / Entry | Architect 2 / Junior | Architect 3 / Mid | Architect 4 / Senior | Architect 5 / Staff | Architect 6 / Senior Staff | Architect 7 / Principal |
|---|---|---|---|---|---|---|---|
| General Description | Entry-level security architect learning security design principles and architecture methodologies. Assists with security assessments, documentation, and basic design work. Develops foundational knowledge of security frameworks, threat modeling, and enterprise architecture concepts. | Junior security architect capable of contributing to security design work and conducting basic architecture assessments. Demonstrates proficiency in security frameworks and can perform threat modeling with guidance. Beginning to develop expertise in specific architecture domains. | Experienced security architect who independently leads security design initiatives and architecture assessments. Serves as subject matter expert for specific architecture domains and mentors junior team members. Shapes security standards and patterns for the organization. | Senior security architect who sets direction for enterprise security architecture. Leads complex, high-impact architecture initiatives and serves as the escalation point for difficult design challenges. Drives security architecture strategy and represents architecture to executive stakeholders. | Distinguished security architect who defines organizational security architecture vision and strategy. Recognized externally as industry expert in security architecture. Shapes how security architecture is practiced and drives innovation in architecture methods and frameworks. | Senior Staff security architect who defines how the security architecture function operates across the entire organization. Sets the enterprise security architecture strategy that all teams build against. Drives multi-year architecture evolution and makes technology decisions with significant budget and organizational implications. Technical decisions at this level directly affect company-level security posture and strategic direction. | Legendary security architect at the pinnacle of architecture expertise. Sets industry direction and is recognized globally as a defining voice in security architecture. Combines unparalleled architectural depth with strategic vision and transformational leadership. |
| Primary Responsibilities |
|
|
|
|
|
|
|
| Required Skills |
|
|
|
|
|
|
|
| Preferred Skills |
|
|
|
|
|
|
|
| Mentorship Requirements | Receives direct mentorship from Senior architects. Shadows on architecture reviews and design sessions. Expected to complete architecture methodology training. Participates in architecture community of practice. | Receives guidance from Senior architects on complex designs. Expected to begin mentoring Entry-level team members. Contributes to architecture standards and patterns. Should be developing expertise in specific domains. | Primary mentor for Junior and Entry architects. Leads architecture training and knowledge sharing. Expected to develop architecture patterns and standards. Establishes reputation as expert in specific domains. | Primary mentor for Mid and Junior architects. Responsible for architecture team development. Creates architecture career paths and programs. Industry mentorship through community engagement. | Mentors Senior architects and emerging leaders. Shapes architecture career paths organization-wide. Industry-level mentorship through community engagement. Develops architecture thought leaders. | Mentors Staff architects toward broader organizational influence. Shapes architecture career paths and development standards organization-wide. Industry mentorship through published work and community engagement. | Develops organizational leadership pipeline. Mentors future industry leaders. Legacy-building through lasting contributions. May sponsor architecture education initiatives. |
| Impact Scope | Individual contributor on documentation and research. Impact limited to supporting architecture deliverables. Work is reviewed by senior architects. Contributes to architecture team effectiveness. | Directly contributes to security design quality. Responsible for specific architecture components. Design decisions impact project security. Beginning to influence architecture standards. | Shapes security architecture for major initiatives. Design decisions set organizational patterns. Standards and frameworks improve security posture. Influences technology strategy and investment. | Defines security architecture for organization. Strategic decisions impact long-term security posture. Team development impacts organizational maturity. Architecture standards enable business outcomes. | Organizational and industry-level impact. Defines how security architecture is practiced. Shapes organizational security transformation. Influences industry standards and practices. | Organization-wide — shapes how the entire company approaches security architecture. Architecture decisions carry multi-year, multi-million-dollar consequences. Standards and patterns directly influence organizational security posture. | Global industry impact. Defines how security architecture is practiced. Organizational transformation and long-term success. Creates lasting contributions to the profession. |
| Autonomy & Decision Authority | Works under close supervision. Follows established architecture standards and templates. Limited authority to make design decisions independently. Escalates architecture questions to senior team. | Works with moderate supervision. Can make design decisions within defined scope. Authority to approve standard patterns. Escalates novel or high-risk design decisions. | Works independently with strategic guidance. Makes significant architecture decisions. Authority over design standards and patterns. Consulted on major technology and security decisions. | High autonomy with strategic alignment. Makes significant architecture and strategy decisions. Authority over architecture standards and governance. Trusted to represent organization on architecture matters. | Near-complete architecture autonomy. Strategic decision-making authority. Influences organizational direction. Authority over architecture vision. Trusted advisor to executive leadership. | Full autonomy over security architecture strategy. Makes architecture and platform decisions with significant budget implications. Accountable to CISO for architecture outcomes. Trusted advisor to executive leadership on security strategy. | Complete autonomy over architecture domain. Executive-level decision authority. Shapes organizational strategy. May have significant influence over industry direction. |
| Communication & Stakeholders | Primarily internal communication with architecture team. Documents findings and research. Participates in design review meetings as observer. Limited stakeholder interaction outside immediate team. | Regular interaction with project teams and stakeholders. Presents design recommendations. Participates in architecture review boards. Documents designs for broader consumption. | Regular communication with security and IT leadership. Presents to executive stakeholders. Engages with enterprise architecture. Documents standards for organization. | Executive-level communication on architecture. Presents to board and steering committees. Represents architecture to organizational leadership. Builds relationships with industry peers. | C-suite and board-level engagement. Industry-wide influence through publications. Standards body and industry forum participation. Media and analyst engagement. | Regular CISO-level and board-level engagement on architecture strategy. Presents architecture roadmap and investment plans to executive leadership. Represents organization's architecture to external assessors and partners. Industry presence. | Global industry presence. Regulatory and government engagement. Media thought leadership. Premier industry and academic venues. |
| Degree / Experience | Bachelor's degree in Computer Science, Cybersecurity, or related field, OR 2-3 years of security engineering or IT architecture experience. Understanding of security design concepts. | Bachelor's degree in Computer Science, Cybersecurity, or related field, OR 3-5 years of security engineering or architecture experience. Demonstrated ability to contribute to security designs. | Bachelor's degree in relevant field with strong experience, OR Master's degree with moderate experience, OR 5-8 years of security architecture experience. Demonstrated track record of successful architecture initiatives. | Master's degree preferred, OR Bachelor's with 8-12 years of security architecture experience. Demonstrated strategic impact and team leadership. Industry recognition through publications or speaking. | Master's degree or higher often expected, OR 12+ years of security architecture experience with demonstrated industry impact. Industry recognition is essential qualification. | Master's degree or higher often expected, OR 12-15+ years of security architecture experience. Demonstrated organization-wide technical authority and strategic impact. | Advanced degree often present, but industry recognition is primary qualification. 15+ years of elite experience with transformational impact. May be founders of major architecture frameworks or methods. |
| Certifications |
|
|
|
|
|
|
|
| Salary: US Gov't | $75,000 - $95,000 (GS-11 to GS-12) | $90,000 - $120,000 (GS-12 to GS-13) | $115,000 - $150,000 (GS-13 to GS-14) | $140,000 - $175,000 (GS-14 to GS-15) | $165,000 - $210,000 (GS-15 / SES equivalent) | $150,000 - $186,000 (GS-15) | $190,000 - $250,000+ (Senior SES equivalent) |
| Salary: US Startup | $85,000 - $115,000 | $110,000 - $145,000 | $145,000 - $185,000 | $175,000 - $230,000 + equity | $215,000 - $290,000 + significant equity | $195,000 - $245,000 + significant equity | $270,000 - $400,000+ + major equity |
| Salary: US Corporate | $80,000 - $110,000 | $100,000 - $135,000 | $135,000 - $175,000 | $165,000 - $215,000 | $200,000 - $265,000 | $190,000 - $235,000 | $250,000 - $350,000+ |
| Salary: Big Tech (Mag7) | $120,000 - $190,000 | $170,000 - $280,000 | $250,000 - $400,000 | $350,000 - $550,000 | $500,000 - $800,000 | $450,000 - $640,000 | $700,000 - $1,200,000 |
Defensive Security Management
Leaders who manage defensive security teams, programs, and business units. Responsible for strategy, people development, stakeholder relationships, and business outcomes. Progress from team management to organizational and executive leadership.
| Attribute | Management 1 / Manager | Management 2 / Senior Manager | Management 3 / Director |
|---|---|---|---|
| General Description | First-line manager responsible for a team of defensive security practitioners. Balances people management with operational oversight. Ensures service quality, team development, and operational excellence. May maintain some hands-on technical work. | Senior manager responsible for multiple teams or a significant security function. Drives strategy, develops managers, and owns outcomes for their area. Balances operational excellence with strategic development and stakeholder management. | Director responsible for a defensive security department or major program area. Sets strategy, owns significant budget, and drives security capability development. Leads senior managers and builds organizational capability while maintaining strong stakeholder and industry relationships. |
| Primary Responsibilities |
|
|
|
| Required Skills |
|
|
|
| Preferred Skills |
|
|
|
| Mentorship Requirements | Primary mentor for direct reports. Responsible for team career development. Develops informal management skills in senior ICs. Participates in management development programs. | Primary mentor for managers and senior ICs. Responsible for leadership development in function. Creates career frameworks and development programs. Industry mentorship presence developing. | Develops senior management talent pipeline. Mentors senior managers and high-potential leaders. Shapes function career frameworks. Industry mentorship through speaking and community engagement. Sponsors emerging leaders. |
| Impact Scope | Team performance and development. Operational outcomes for assigned function. Team retention and growth. Stakeholder relationships. | Function performance and development. Security outcomes for major area. Multi-team capability and maturity. Senior stakeholder relationships. | Function performance and strategic direction. Department financial outcomes. Senior leadership capability. Strategic stakeholder relationships. Industry reputation and influence. |
| Autonomy & Decision Authority | Authority over team operations and assignments. Makes hiring recommendations. Budget authority within defined limits. Escalates strategic decisions to director level. | Significant operational autonomy. Budget authority for function. Authority over strategy within area. Makes significant hiring and investment decisions. Reports to Director or CISO level. | Full authority over function operations. Budget ownership and investment decisions within allocation. Authority over senior hiring and organizational structure. Strategic decision-making for function. Reports to VP, CISO, or executive leadership. |
| Communication & Stakeholders | Regular communication with director leadership. Stakeholder communication on operational matters. Team communication and alignment. Cross-functional coordination. | Executive-level stakeholder engagement. Security leadership communication. May represent security externally. Board-level reporting preparation. | VP and executive leadership engagement. Business unit leader relationships. Industry conference and event presence. Cross-functional executive collaboration. May engage with board on function matters. |
| Degree / Experience | Bachelor's degree in relevant field with 6+ years of defensive security experience including leadership, OR equivalent experience. Technical depth with demonstrated leadership capability. | Bachelor's degree with 8+ years experience including management, OR Master's degree with 6+ years. Demonstrated leadership of managers and function outcomes. | Bachelor's degree with 10+ years including senior management leadership, OR Master's/MBA with 8+ years. Demonstrated budget ownership and function growth. Industry recognition developing. |
| Certifications |
|
|
|
| Salary: US Gov't | $120,000 - $155,000 (GS-14 to GS-15) | $150,000 - $190,000 (GS-15 / SES equivalent) | $170,000 - $210,000 (GS-15 Step 10 / SES equivalent) |
| Salary: US Startup | $145,000 - $190,000 + equity | $180,000 - $250,000 + significant equity | $210,000 - $290,000 + significant equity |
| Salary: US Corporate | $135,000 - $180,000 | $170,000 - $235,000 | $195,000 - $270,000 + bonus |
| Salary: Big Tech (Mag7) | $350,000 - $550,000 | $450,000 - $700,000 | $550,000 - $900,000 |
Insider Threat
Behavioral analytics, insider risk detection, investigation of data exfiltration and sabotage, and HR/legal coordination
Insider Threat Analyst
Professionals who detect, investigate, and mitigate threats originating from insiders—employees, contractors, and trusted partners. Focus on behavioral analytics, user and entity behavior analytics (UEBA), policy violation detection, investigation of data exfiltration and sabotage, and coordinating with HR, legal, and management on sensitive cases. Distinct from SOC analysts (who focus on external threats) and fraud analysts (who focus on financial fraud). Insider threat work demands extreme discretion, an understanding of legal and privacy constraints, and the ability to conduct investigations that may involve colleagues at every level of the organization.
| Attribute | Analyst 1 / Entry | Analyst 2 / Junior | Analyst 3 / Mid | Analyst 4 / Senior | Analyst 5 / Staff | Analyst 6 / Senior Staff | Analyst 7 / Principal |
|---|---|---|---|---|---|---|---|
| General Description | Entry-level insider threat analyst learning the fundamentals of insider risk detection and investigation. Monitors UEBA and DLP alerts, follows established triage procedures, and documents case activity under close supervision. Develops foundational understanding of behavioral indicators, insider threat frameworks, and the legal and privacy boundaries that govern this work. | Junior insider threat analyst capable of independently triaging behavioral alerts and contributing to investigations. Demonstrates proficiency with UEBA and DLP platforms and can distinguish genuine insider risk indicators from benign activity. Understands the sensitivity of insider threat work and maintains appropriate discretion in all communications. | Experienced insider threat analyst who independently leads investigations from detection through resolution. Expert at correlating behavioral signals across multiple data sources to build comprehensive insider risk profiles. Serves as the primary interface between the insider threat program and HR, legal, and management stakeholders on active cases. Understands the full lifecycle of insider threat cases including legal constraints, evidence standards, and the human factors that drive insider risk. | Senior insider threat analyst with deep expertise in complex and high-stakes investigations involving executives, nation-state recruitment, intellectual property theft, and potential espionage. Serves as the escalation point for the most sensitive cases and provides expert guidance on legal, regulatory, and ethical dimensions of insider threat work. Leads the development of detection strategies and ensures the program balances security effectiveness with employee privacy and organizational culture. | Staff-level insider threat analyst with cross-organizational influence who shapes how insider threat detection and investigation are conducted across the enterprise. Develops detection methodologies, investigation frameworks, and risk assessment models that other analysts use. Drives integration between insider threat, counterintelligence, HR, legal, and physical security functions. Recognized as a subject matter authority within the organization and increasingly in the broader insider threat community. | Senior Staff insider threat analyst with organization-wide authority who defines how the insider threat function operates and integrates with broader enterprise risk management. Shapes policy, establishes governance structures, and drives the convergence of insider threat with counterintelligence, corporate security, and compliance functions. Influences industry standards and government frameworks for insider threat programs. | Principal insider threat analyst with industry-defining expertise who creates methodologies, frameworks, and standards adopted beyond their organization. Recognized nationally or internationally as a leading authority on insider threat detection, investigation, and program development. Shapes government policy, academic research, and industry best practices. Operates at the intersection of cybersecurity, counterintelligence, behavioral science, and organizational risk. |
| Primary Responsibilities |
|
|
|
|
|
|
|
| Required Skills |
|
|
|
|
|
|
|
| Preferred Skills |
|
|
|
|
|
|
|
| Mentorship Requirements | Receives direct mentorship from Senior insider threat analysts. Shadows on case reviews, HR coordination meetings, and management briefings. Expected to complete insider threat program training including legal and privacy frameworks. Learns the boundaries between security monitoring and employee surveillance. | Receives guidance from Senior analysts on complex cases and legal sensitivities. Expected to begin assisting Entry-level analysts with triage procedures. Developing expertise in specific insider threat vectors (data exfiltration, IP theft, workplace violence indicators). Learns to navigate the tension between thorough investigation and employee privacy. | Mentors Junior and Entry-level analysts on investigation techniques and case handling. Expected to develop expertise in the organization's unique insider threat landscape. Provides guidance on legal sensitivities and stakeholder management. Should be building relationships with HR, legal, and business unit leaders. | Mentors Mid and Junior analysts on complex case management and stakeholder navigation. Provides expert guidance on legal and ethical boundaries. Expected to develop next-generation analysts through structured case review and feedback. Establishes standards for investigation quality and documentation. | Mentors Senior and Mid-level analysts on career development and complex case strategy. Develops training programs and investigation playbooks for the insider threat function. Expected to grow talent and build institutional knowledge. Mentors cross-functionally, helping HR and legal partners understand insider threat tradecraft. | Mentors Staff and Senior analysts on program leadership and strategic thinking. Develops future insider threat program leaders. Expected to build the organization's insider threat bench strength and succession plan. Mentors cross-functionally at the executive level on insider risk culture. | Mentors across the industry, not just within their organization. Develops insider threat leaders through published frameworks, conference presentations, and direct advisory. Expected to elevate the entire insider threat discipline. Shapes academic curricula and professional certification standards. |
| Impact Scope | Individual contributor on alert triage and case documentation. Impact limited to supporting active investigations. All work is reviewed before any action is taken. Contributes to overall program coverage and detection metrics. | Directly contributes to insider threat detection and case development. Responsible for accurate alert triage that affects whether investigations are opened. Analysis informs management decisions about employee risk. Beginning to influence detection rule tuning. | Leads investigations that directly affect personnel decisions and organizational risk posture. Analysis influences policy development and insider threat program direction. Recommendations may result in termination, legal action, or law enforcement referral. Responsible for accurate risk assessment on high-impact cases. | Investigations directly influence executive decisions, legal proceedings, and organizational risk posture. Detection strategies shape the program's ability to identify insider threats across the enterprise. Recommendations may involve C-suite personnel or result in criminal prosecution referrals. Sets quality standards for the insider threat function. | Enterprise-wide influence on insider threat detection and investigation capabilities. Methodologies and frameworks are adopted across business units. Program strategy recommendations influence multi-year security investment. Work shapes organizational culture around insider risk awareness and reporting. | Defines how the organization approaches insider threat at the strategic level. Policies and governance frameworks shape enterprise culture around insider risk. Decisions influence multi-year investment and organizational structure. Industry contributions shape how peer organizations build insider threat capabilities. | Industry-wide influence on how insider threat programs are built, measured, and operated. Frameworks and methodologies are adopted by peer organizations and government agencies. Shapes national policy and international standards. Defines best practices for the insider threat profession. |
| Autonomy & Decision Authority | Works under close supervision. Follows established triage and escalation procedures. No authority to initiate investigations or contact subjects. Escalates all potential insider threat indicators to senior analysts. | Works with moderate supervision. Can make routine triage decisions and close false positive alerts. Authority to gather supporting evidence for active cases. Escalates case opening decisions and any contact with subjects or managers. | Works independently on most investigations. Authority to open cases and direct investigation activities. Makes triage and prioritization decisions for the alert queue. Escalates cases involving executives, legal complexity, or potential criminal referral. | Works independently on all investigation types. Authority to direct investigation strategy and resource allocation. Makes risk-based decisions on case prioritization and scope. Escalates only cases with board-level or regulatory implications. Trusted to manage highly sensitive information with minimal oversight. | Sets direction for insider threat detection strategy and investigation methodology. Authority to define program standards and resource priorities. Makes independent decisions on program architecture and tool selection. Partners with executive leadership on strategic decisions. | Sets strategic direction for the insider threat function. Authority to establish policy, governance, and organizational structure. Makes independent decisions on program architecture and resource allocation. Partners with the CISO and executive committee on board-level matters. | Operates with full autonomy on insider threat strategy and methodology development. Authority is based on expertise and reputation rather than organizational hierarchy. Trusted to represent the organization and influence industry direction. Engages directly with government and regulatory leadership. |
| Communication & Stakeholders | Primarily internal communication with the insider threat team. Documents findings in case management systems. Limited direct interaction with HR, legal, or management. Participates in team briefings and shift handoffs. | Regular interaction with the insider threat team and SOC. Provides case updates to senior analysts. Limited direct interaction with HR or legal. Documents analysis for internal case management. | Regular direct interaction with HR business partners and legal counsel. Briefs middle and senior management on case findings. Presents at insider risk review boards. Coordinates with SOC and IT on technical data collection. May interact with law enforcement on referred cases. | Direct communication with C-suite and senior leadership on high-profile cases. Regular coordination with General Counsel and CHRO. Briefs audit committees and risk oversight bodies. Maintains relationships with FBI, CISA, and relevant law enforcement agencies. Represents the insider threat program externally at industry forums. | Regular engagement with CISO, General Counsel, and CHRO. Presents to board risk committees and audit bodies. Represents the organization at industry events and government coordination forums (NITTF, FBI InfraGard). Leads cross-functional working groups. | Regular engagement with CEO, board of directors, and executive committee. Coordinates with government agencies at the senior leadership level. Represents the organization in national-level insider threat forums. Leads executive education on insider risk. | Engages with national security leadership, regulatory bodies, and legislative staff. Keynotes industry conferences and publishes in professional journals. Advises peer-organization CISOs and boards. Represents the profession in media and public discourse on insider threat. |
| Degree / Experience | Bachelor's degree in Cybersecurity, Criminal Justice, Psychology, Intelligence Studies, or related field, OR 1-2 years of SOC, investigations, or security operations experience, OR law enforcement or military counterintelligence background transitioning to private sector. | Bachelor's degree in relevant field, OR 2-4 years of insider threat, SOC, investigations, or counterintelligence experience. Demonstrated ability to handle sensitive investigations with discretion. | Bachelor's degree in relevant field plus 4-6 years of insider threat, investigations, counterintelligence, or security operations experience, OR equivalent combination of education and demonstrated investigation expertise. | Bachelor's or Master's degree in relevant field plus 6-9 years of insider threat, counterintelligence, or complex investigations experience, OR equivalent demonstrated expertise in leading sensitive investigations and insider threat program operations. | Master's degree or equivalent plus 9-12 years of progressive insider threat, counterintelligence, or security investigations experience, OR equivalent demonstrated expertise in building and leading insider threat programs. | Master's degree or equivalent plus 12-16 years of progressive insider threat, counterintelligence, or senior security leadership experience, OR equivalent demonstrated impact in shaping insider threat programs at the enterprise or national level. | Master's or doctoral degree plus 15+ years of insider threat, counterintelligence, or senior security leadership experience, OR nationally recognized expertise demonstrated through published work, government advisory roles, and industry leadership. |
| Certifications |
|
|
|
|
|
|
|
| Salary: US Gov't | $55,000 - $75,000 (GS-7 to GS-9) | $70,000 - $95,000 (GS-9 to GS-11) | $85,000 - $120,000 (GS-12 to GS-13) | $115,000 - $155,000 (GS-13 to GS-14) | $130,000 - $175,000 (GS-14 to GS-15) | $140,000 - $191,000 (GS-15 to SES) | $160,000 - $210,000 (SES / SL) |
| Salary: US Startup | $60,000 - $85,000 | $80,000 - $105,000 | $100,000 - $135,000 | $130,000 - $170,000 | $155,000 - $200,000 | $180,000 - $240,000 | $200,000 - $275,000 |
| Salary: US Corporate | $55,000 - $80,000 | $75,000 - $105,000 | $95,000 - $130,000 | $130,000 - $175,000 | $155,000 - $210,000 | $190,000 - $260,000 | $220,000 - $300,000 |
| Salary: Big Tech (Mag7) | $115,000 - $175,000 | $165,000 - $260,000 | $230,000 - $360,000 | $320,000 - $500,000 | $350,000 - $550,000 | $400,000 - $650,000 | $500,000 - $750,000 |
Insider Threat Engineer
Technical professionals who build, deploy, and maintain the platforms, tooling, and data pipelines that enable insider threat detection at scale. Focus on UEBA and DLP platform engineering, behavioral analytics model development, data integration across HR/IT/security systems, and creating the monitoring infrastructure that insider threat analysts rely on. Bridge the gap between security engineering and the specialized requirements of insider threat programs, including privacy-preserving architectures and legal compliance in monitoring systems.
| Attribute | Eng 1 / Entry | Eng 2 / Junior | Eng 3 / Mid | Eng 4 / Senior | Eng 5 / Staff | Eng 6 / Senior Staff | Eng 7 / Principal |
|---|---|---|---|---|---|---|---|
| General Description | Entry-level insider threat engineer learning the technical foundations of insider threat detection platforms. Assists with deploying and maintaining UEBA and DLP tools, configuring data connectors, and supporting the infrastructure that enables behavioral analytics. Develops foundational understanding of how technical systems support insider threat programs while respecting privacy and legal constraints. | Junior insider threat engineer capable of independently managing day-to-day platform operations and implementing standard configurations. Proficient with UEBA and DLP platform administration, data connector management, and basic rule development. Understands the data architecture that supports behavioral analytics and can troubleshoot data quality issues across the insider threat detection stack. | Experienced insider threat engineer who independently designs and implements detection infrastructure, behavioral analytics pipelines, and data integration architectures. Leads platform deployments and migrations, develops complex detection logic, and builds the data engineering foundation that enables advanced behavioral analytics. Bridges the gap between analyst detection requirements and technical platform capabilities. | Senior insider threat engineer with deep technical expertise in building enterprise-scale insider threat detection platforms. Designs end-to-end architectures that integrate UEBA, DLP, endpoint monitoring, and HR data systems into cohesive detection and investigation platforms. Expert in privacy-preserving monitoring design, behavioral analytics at scale, and the technical complexities of building systems that balance security effectiveness with employee privacy and legal compliance. | Staff-level insider threat engineer with cross-organizational influence who defines the technical strategy and platform architecture for insider threat detection at enterprise scale. Builds detection systems, data frameworks, and engineering methodologies that other engineers and teams use. Drives convergence of insider threat engineering with broader security engineering and data platform functions. Recognized as a technical authority on insider threat infrastructure within the organization. | Senior Staff insider threat engineer with organization-wide authority who shapes the technical vision for how insider threat detection and monitoring are engineered across the enterprise. Drives the convergence of insider threat infrastructure with broader security, data, and privacy engineering functions. Influences industry platforms and standards through technical leadership and innovation. Defines the engineering culture and technical excellence standards for insider threat systems. | Principal insider threat engineer with industry-defining technical expertise who creates engineering approaches, platform architectures, and detection methodologies adopted beyond their organization. Recognized nationally or internationally as a leading technical authority on insider threat detection infrastructure, behavioral analytics engineering, and privacy-preserving monitoring. Advances the state of the art through research, open-source contributions, and technical standards that shape how the industry builds insider threat systems. |
| Primary Responsibilities |
|
|
|
|
|
|
|
| Required Skills |
|
|
|
|
|
|
|
| Preferred Skills |
|
|
|
|
|
|
|
| Mentorship Requirements | Receives direct mentorship from Senior insider threat engineers. Shadows on platform deployments and architecture discussions. Expected to complete training on deployed UEBA/DLP platforms. Learns the unique data handling requirements for insider threat monitoring including privacy controls and legal authority boundaries. | Receives guidance from Senior engineers on architecture decisions and complex integrations. Expected to begin assisting Entry-level engineers with routine tasks. Developing expertise in specific platforms or data domains. Learns the compliance requirements that govern insider threat monitoring infrastructure. | Mentors Junior and Entry-level engineers on platform engineering and data architecture. Expected to develop deep expertise in the organization's insider threat technology stack. Provides guidance on privacy-preserving design and compliance requirements. Should be building relationships with analysts to understand detection needs. | Mentors Mid and Junior engineers on architecture and system design. Provides expert guidance on privacy-preserving engineering and compliance. Expected to develop next-generation engineers through architecture reviews and design discussions. Establishes technical standards for the engineering team. | Mentors Senior and Mid-level engineers on architecture, career development, and technical leadership. Develops engineering standards and training programs for the insider threat platform team. Expected to grow technical talent and build organizational capability. Mentors engineers on navigating the unique privacy and legal constraints of insider threat engineering. | Mentors Staff and Senior engineers on technical leadership and career trajectory. Develops future engineering leaders and technical fellows. Expected to build engineering culture and organizational capability at scale. Shapes the insider threat engineering profession through public contributions. | Mentors across the industry through published work, open-source contributions, and conference presentations. Develops future technical leaders and engineering fellows. Expected to advance the insider threat engineering discipline as a whole. Shapes engineering education and professional development standards. |
| Impact Scope | Individual contributor on platform maintenance and configuration tasks. Impact limited to supporting infrastructure reliability. Work is reviewed before deployment. Contributes to overall platform uptime and data quality. | Directly responsible for platform reliability and data quality that analysts depend on. Configuration and rule changes affect detection coverage. Beginning to influence platform architecture decisions. Contributes to the technical capability of the insider threat program. | Responsible for the technical capabilities that define what the insider threat program can detect. Platform designs and data architectures are used across the program. Performance and reliability directly affect analyst effectiveness. Influences technology selection and architecture direction. | Platform architectures define the technical capabilities of the entire insider threat program. Design decisions affect detection coverage, analyst productivity, and program scalability. Technology selections influence multi-year program direction. Engineering standards are adopted across the team. | Defines the technical capabilities of the insider threat function across the enterprise. Platform strategy and architecture decisions affect multi-year program direction. Engineering frameworks are adopted across teams. Influences enterprise architecture and data platform decisions beyond insider threat. | Defines how the organization engineers insider threat detection at the strategic level. Technical vision shapes multi-year platform investments. Innovation and standards work influence industry direction. Engineering governance frameworks are adopted across the security organization. | Industry-wide influence on how insider threat detection systems are engineered, deployed, and operated. Technical innovations and open-source contributions are adopted by peer organizations. Shapes government technology requirements and industry standards. Defines best practices for insider threat engineering. |
| Autonomy & Decision Authority | Works under close supervision. Follows established deployment and configuration procedures. Limited authority to make changes to production systems. Escalates platform issues and configuration requests to senior engineers. | Works with moderate supervision. Can make routine platform administration decisions. Authority to implement standard configurations and rule changes. Escalates architecture changes and new data source integrations to senior engineers. | Works independently on most engineering tasks. Authority to make architecture decisions for individual components. Leads platform deployments and data integration projects. Escalates decisions affecting enterprise architecture or privacy compliance. | Works independently on all engineering tasks. Authority to make architecture decisions and set technical standards. Leads technology evaluations and vendor selection. Escalates only decisions with enterprise-wide architectural or budgetary implications. | Sets technical direction for insider threat engineering. Authority to define platform strategy and engineering standards. Makes independent decisions on architecture and technology selection. Partners with program leadership and CISO on strategic technology investments. | Sets technical vision for insider threat engineering across the enterprise. Authority to define engineering standards, platform strategy, and technology investments. Makes independent strategic technology decisions. Partners with the CISO and CTO on enterprise-level engineering direction. | Operates with full autonomy on technical strategy and innovation. Authority is based on expertise and technical reputation. Trusted to represent the organization and influence industry direction. Engages directly with government and vendor leadership on technology strategy. |
| Communication & Stakeholders | Primarily internal communication with the insider threat engineering team. Documents configurations and issues in ticketing systems. Limited interaction with analysts or program leadership. May participate in team stand-ups and planning sessions. | Regular interaction with insider threat analysts on data quality and detection requirements. Communicates platform status and maintenance windows. Limited interaction with program leadership. Documents technical decisions and configurations. | Regular interaction with insider threat analysts on detection requirements and capabilities. Coordinates with IT infrastructure and security engineering teams. Communicates technical constraints and capabilities to program leadership. Presents architecture proposals to senior engineers and management. | Regular interaction with insider threat program leadership on technology strategy. Coordinates with enterprise architecture and CISO office. Presents technical strategies to senior management. Leads architecture review boards for insider threat systems. Interfaces with vendors at the engineering leadership level. | Regular engagement with CISO, program leadership, and enterprise architecture. Presents technical strategy to senior management and executive committees. Represents insider threat engineering in industry forums. Leads engineering review boards and cross-team coordination. | Regular engagement with CISO, CTO, and executive leadership on technology strategy. Represents the organization at industry engineering forums and standards bodies. Leads cross-organizational engineering governance. Advises vendors and partners on platform direction. | Engages with national security technology leadership and regulatory bodies. Keynotes industry conferences and publishes in technical journals. Advises peer-organization engineering leaders and CTOs. Represents the profession in technical standards development. |
| Degree / Experience | Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or related field, OR 1-2 years of IT infrastructure, security operations, or systems engineering experience. | Bachelor's degree in relevant field, OR 2-4 years of security engineering, platform administration, or data engineering experience with exposure to insider threat or monitoring technologies. | Bachelor's degree in relevant field plus 4-6 years of security engineering, data engineering, or platform development experience with insider threat or monitoring technology focus. | Bachelor's or Master's degree in Computer Science, Data Engineering, or related field plus 6-9 years of security engineering, data engineering, or platform architecture experience with significant insider threat or monitoring focus. | Master's degree or equivalent plus 9-12 years of progressive security engineering, data engineering, or platform architecture experience with demonstrated insider threat or advanced monitoring expertise. | Master's or doctoral degree plus 12-16 years of progressive security engineering, data platform architecture, or technical leadership experience with significant insider threat or advanced monitoring expertise. | Master's or doctoral degree in Computer Science, Data Science, or related field plus 15+ years of progressive security engineering, data platform, or technical leadership experience, OR nationally recognized technical expertise demonstrated through published research, patents, and industry leadership. |
| Certifications |
|
|
|
|
|
|
|
| Salary: US Gov't | $55,000 - $75,000 (GS-7 to GS-9) | $70,000 - $95,000 (GS-9 to GS-11) | $85,000 - $120,000 (GS-12 to GS-13) | $115,000 - $155,000 (GS-13 to GS-14) | $130,000 - $175,000 (GS-14 to GS-15) | $140,000 - $191,000 (GS-15 to SES) | $160,000 - $210,000 (SES / SL) |
| Salary: US Startup | $65,000 - $90,000 | $85,000 - $115,000 | $110,000 - $145,000 | $140,000 - $185,000 | $165,000 - $220,000 | $200,000 - $265,000 | $225,000 - $300,000 |
| Salary: US Corporate | $60,000 - $85,000 | $80,000 - $110,000 | $100,000 - $140,000 | $135,000 - $180,000 | $160,000 - $225,000 | $200,000 - $275,000 | $240,000 - $325,000 |
| Salary: Big Tech (Mag7) | $120,000 - $180,000 | $170,000 - $270,000 | $240,000 - $380,000 | $340,000 - $520,000 | $380,000 - $580,000 | $450,000 - $680,000 | $550,000 - $800,000 |